US7272565B2 - System and method for monitoring individuals - Google Patents
System and method for monitoring individuals Download PDFInfo
- Publication number
- US7272565B2 US7272565B2 US10/320,706 US32070602A US7272565B2 US 7272565 B2 US7272565 B2 US 7272565B2 US 32070602 A US32070602 A US 32070602A US 7272565 B2 US7272565 B2 US 7272565B2
- Authority
- US
- United States
- Prior art keywords
- individual
- voice
- voice sample
- monitor
- match
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Definitions
- the present invention relates to a system and method for monitoring individuals.
- the instant invention is directed to a system and method for using, for example, digitized voice prints to identify individuals being monitored by an authorized agency, and upon such identification, providing the authorized agency with information relating to the identified individual.
- voice communications it is well known that various governmental agencies monitor voice communications to gather intelligence information. Typically, these voice communications are monitored for content, and individuals engaged in the voice communications may or may not be known to authorities. For example, if the communication is being made from a known telephone number at a fixed address, there is no guarantee that the person registered as being responsible for paying bills for costs incurred by that telephone number is actually the person engaged in the voice communication. Moreover, with the advent and increasing popularity of, for example, pre-paid telephone cards, cellular telephones and voice over IP systems, it is becoming increasingly difficult to associate a particular identity of, and information relating to, the individuals engaged in the monitored conversation.
- a system for monitoring individuals be created in which digitized voice prints of individuals are obtained and stored in a central repository for use by authorized agencies that monitor voice communications.
- the digitized voice prints may be used to identify the speakers being monitored. If the conversation being monitored causes the monitoring agency, based on their predetermined alert criteria, to suspect the speakers of illegal activity, such as, for example, terrorism, or otherwise cause the monitor to seek additional information about the speakers, the monitoring agency may access information associated with the voice print and retrieve the information associated with those individuals so that this information may be passed along to the appropriate agency or organization for further action.
- an embodiment of the present invention is directed to a method for identifying a speaker using digital voice prints, the method comprising: obtaining a voice sample of a speaker; storing the voice sample in a memory; associating information relating to the speaker with the voice sample in the memory; monitoring voice communications; identifying the speaker being monitored by matching the speaker's voice with a stored voice sample; and upon obtaining a successful match, outputting the associated information of the identified speaker from the memory.
- voice samples are gathered based on predetermined criteria, such as, for example, when a foreign national enters the U.S. on a student visa, a visitor visa or is entering the U.S. as a foreign national with permanent resident status. Other criteria, such as those listed above, for example, may also be used to determine when a voice sample is to be taken.
- the voice sample is associated with additional information that is stored in the memory.
- This additional information may serve to assist the monitors or other agencies in locating and/or ascertaining more information relating to the speaker.
- the associated information may include the speaker's name, known aliases, last known address, last known telephone number, nationality, visa status and number, criminal record, biometric data relating to the speaker (e.g., fingerprint data, DNA data, handwriting sample, etc.), whether the speaker owns a weapon (e.g., a registered firearm), and psychological data relating to the speaker (e.g., whether the speaker has a history of violent or malevolent behavior, etc.).
- the associated information may be linked to the stored voice sample by any of a wide variety of well known data structures or relational database techniques. These data structures may, for example, be in the form of a certificate or form having the characteristics or information to be associated with a particular voice sample. These data structures may be stored in a memory separate from the memory storing the voice sample, or in the same memory. In any event, it would be advantageous to efficiently link the associated data structure with the corresponding voice sample to ensure quick and accurate access to the data once a voice sample match is obtained.
- a system for monitoring individuals comprising: a circuit for obtaining a voice sample; a memory for storing the voice sample together with associated data relating to the speaker whose voice sample is being stored; a monitor for monitoring voice communications; a processor for matching a voice sample obtained from the monitor with a voice sample stored in the memory and, if a match is found, outputting associated data of the speaker whose voice sample stored in the memory matches the monitored voice sample.
- FIG. 1 is a block diagram of an illustrative embodiment of the invention
- FIG. 2 is a flowchart illustrating the operation of obtaining a voice sample according to an exemplary embodiment of the invention
- FIG. 3 is a flowchart illustrating a matching operation that matches a stored voice sample with a voice sample of a speaker being monitored according to an exemplary embodiment of the invention.
- FIG. 4 is a diagram illustrating a data structure of information associated with a voice sample according to an exemplary embodiment of the invention.
- FIG. 1 is a block diagram illustrating an exemplary embodiment of the system of the invention.
- FIG. 1 shows an authorizing agency 10 , such as, for example, the Immigration and Naturalization Service of the U.S. Government (INS).
- INS the Immigration and Naturalization Service of the U.S. Government
- a voice sample is obtained by having a speaker speak into a microphone 14 .
- the microphone 14 provides its output to a voice sampling system 12 .
- the voice sampling system 12 may be any type of commercially available system typically available at most computer retailers.
- the voice sampling system 12 receives the output of the microphone 14 and samples the voice received using any of a variety of well known techniques.
- the voice sample is then digitized and stored in any of a number of well known forms, including, for example, a phonemic representation of the voice pattern. It will be understood that it may be necessary for the speaker to read or repeat a predetermined phrase into the microphone 14 so that the voice sampling system 12 is able to obtain a large enough volume of, for example, phonemes, for subsequent recognition and matching.
- the voice sampling system 12 is in communication with a central computer 18 via a telecommunications network, such as, for example, a governmental data communication network, the Internet, or the like.
- the central computer 18 may be connected to numerous voice sampling systems 12 .
- all of the INS immigration stations and entry points in the U.S. may be connected to the central computer 18 .
- the central computer 18 is in communication with a central database 20 .
- the central database stores the voice samples obtained by various agencies throughout the system.
- the authorizing agency 10 typically possesses information relating to the speaker who is providing a voice sample for the system.
- this information may include, for example, the speaker's name, residence address while in the U.S., name of institution where the speaker is studying, visa number and visa related INS information from the visa application, fingerprint information, a photograph, etc.
- Some or all of the available associated information may be included in a certificate illustrated in FIG. 4 and discussed in more detail below.
- This certificate may be associated or linked by the central computer 18 with the voice sample corresponding to a speaker whose information appears on the certificate and is stored in the central database 20 . Linking algorithms and relational database techniques may, for example, be used to relate the associated data to the voice sample. Because the voice sample is linked to the associated information, when a match between a monitored voice and a stored voice sample is obtained, it will be relatively efficient to retrieve the associated information relating to the identified speaker.
- the central computer 18 and central database 20 are connected to various monitoring agencies via a communications network 16 .
- This communications network may be the same as that used to transfer the voice sample and, when necessary, associated data to the central computer 18 , or it may be a separate network or dedicated communications connection, for example.
- the monitoring agency 22 may be, for example, an intelligence agency that monitors telecommunications traffic on any of a variety of communications circuits, for example, a public switched telephone network (PSTN), radio network, cellular network, voice over IP communications network, etc.
- PSTN public switched telephone network
- the monitoring agency 22 may submit voice samples obtained during monitoring of the various communications circuits (not shown) to a dedicated or shared distributed system 24 for processing the monitored voice sample and determining if a match exists between any of the voice samples stored in the central database 20 and the voice sample extracted during monitoring.
- the recognition and matching is preferably achieved by algorithms running on a computer. However, it will be understood that hardware circuitry for performing the same functions will be easily and readily constructed by one of ordinary skill in the art.
- the recognition and matching system 24 is also preferably in communication with the central computer 18 and central database 20 over, for example, a dedicated communications network (not shown), the common communication network 16 , or any other communication network. It will be understood that the recognition and matching system 24 may be integrated with the voice monitoring devices (not shown) used by the monitoring agency 22 . In an exemplary embodiment illustrated in FIG. 1 , the monitoring system is separate from the centralized recognition and matching system which is preferably realized on a single computer.
- any variety of architectures for achieving the functionality of the monitoring and recognition and matching systems may be employed, including, for example, a single computer in which the monitoring and recognition and match functionality are integrated and realized together, each of the single computers having integrated functionality being located at the individual monitoring sites or locations.
- FIG. 2 is a flowchart illustrating an exemplary procedure for obtaining a voice sample from an individual of interest.
- the agency in this example, the INS, determines if the individual entering the country is a person of interest, i.e., an individual whose voice sample is to be taken.
- the criteria for determining whose voice sample to take may be any of a number of differing criteria or profiles that are determined by the agency authorizing the sampling of the individual's voice. In the example discussed herein, a foreign national entering the U.S. on a student visa fits the criteria for having a voice sample taken.
- a determination is made in step S 2 as to whether a voice sample is required.
- step S 2 requires that a voice sample be taken, then a determination is made in step S 3 as to whether a sample of the individual's voice is already on file, i.e., in the database 20 .
- This checking may be done in a wide variety of ways that will be readily apparent to those skilled in the art. For example, the sampled voice may be compared with the voice samples in the database to determine if the voice sample is already stored in the database. Alternatively, for example, there may be a listing of names of individuals whose voice sample has already been taken. This list may be checked by the INS agent who is processing the individual.
- step S 3 a sample is obtained in step S 4 as set forth above with respect to FIG. 1 , for example, via a microphone 14 and voice sampling system 12 .
- step S 5 the sample, in the form output by the voice sampling system 12 , is transmitted via the communications network 16 to the database 20 via the computer 18 .
- Associated data of the individual being sampled is concurrently entered S 6 into appropriate fields of the information certificate 50 shown, for example, in FIG. 4 .
- the associated data certificate 50 is stored, for example, in the database 20 , together with linking information that will link the certificate 50 to the appropriate voice sample.
- FIG. 3 is a flowchart illustrating the matching operation that is conducted by the monitoring agency 22 via the recognition and match system 24 .
- an agency monitoring voice communications may sample the voice being monitored S 10 .
- the voice sample is digitized S 11 , for example, using the same or similar sampling and digitizing techniques as the voice sampling system 12 that was used to obtain the original voice sample stored in the database 20 .
- the digital voice sample of the person being monitored is transmitted to the recognition and match system 24 that executes a match algorithm or procedure S 12 , for example.
- the matching procedure is preferably realized via a software algorithm running on a processor. However, a hardware implementation may be equally acceptable.
- the match algorithm S 12 identifies a match with a stored voice sample, the fact that a match has been found is communicated to the monitoring agency 22 . If the monitoring agency 22 determines that associated information of the speaker is needed, a request S 14 for that associated information is communicated to the central computer 18 , which then extracts S 15 the associated information from the database 20 and communicates the associated information to the agency 22 in step S 16 . If no match is found, the monitoring agency 22 may continue monitoring voice communications and recursively continue the monitoring process.
- FIG. 4 is an illustrative diagram of a data structure or certificate 50 that contains various information associated with the stored voice samples, and is linked thereto.
- the certificate 50 may contain any number N of data fields, each data field containing information regarding the speaker whose voice has been sampled and stored.
- the associated information may include the speaker's name, known aliases, last known address, last known telephone number, nationality, visa status and number, criminal record, biometric data relating to the speaker (e.g., fingerprint data, DNA data, handwriting sample, etc.), whether the speaker owns a weapon (e.g., a registered firearm), and psychological data relating to the speaker (e.g., whether the speaker has a history of violent or malevolent behavior, etc.).
- the number of data fields N and the information included in those data fields is a choice that is made by the agencies using the system, and is a function of information that is typically available regarding an individual whose voice has been sampled.
- the certificate 50 may also include a linking data field 52 that may aid in the extraction of the associated information when a match has been found.
- the entry point processor 10 may request that a voice sample of the individual be obtained and stored in the database 20 together with associated information of the individual.
- the authorizing agency will typically have predetermined procedures and profiles of individuals who, upon entering the U.S., may be required to submit a voice sample.
- the INS requires foreign nationals entering the U.S. on a student visa to provide a voice sample. If the determination is made by the agency 10 that a voice sample is to be obtained, the individual is required to speak into a microphone or like device to provide a voice sample to a voice sampling system 12 .
- the speaker may be required to make specific utterances into the microphone 14 to provide sufficient information to the voice sampling system 12 .
- the voice sampling system 12 upon receiving the sampled voice data, digitizes the voice sample and puts it into a suitable format for subsequent match processing, such as, for example, digital phonemic representations of the sampled speech.
- the sampled speech is stored in a database 20 .
- Information associated with the speaker whose sampled speech is stored in the database is linked to the voice sample being stored.
- the information associated with the voice sample may be in the form of a certificate 50 as described above with respect to FIG. 4 which includes linking data to ensure that the voice sample is linked to the certificate 50 .
- a database 20 of voice samples and associated information linked thereto can be built by inputs from various authorities based on numerous and varied criteria.
- the database 20 once constructed, will be available to any and all monitoring agencies authorized to access the database 20 by the owner of the database 20 , such as, for example, the United States Government.
- Monitoring agencies 22 typically monitor voice communications occurring over a variety of telecommunications circuits (not shown). For example, the monitoring agencies 22 may monitor public switched telephone networks (PSTNs), radio networks, cellular networks, voice over IP communications networks, etc. If the conversation being monitored causes the monitoring agency, based on their predetermined alert criteria, to suspect the speakers of illegal activity, such as, for example, terrorism, or otherwise cause the monitor to seek additional information about the speakers, the monitoring agency may be desirous of accessing information associated with the voice being monitored and retrieving the information associated with those individuals so that this information may be passed along to the appropriate agency or organization for further action using the system and method of the present invention.
- PSTNs public switched telephone networks
- radio networks such as, for example, terrorism, or otherwise cause the monitor to seek additional information about the speakers
- the monitoring agency may be desirous of accessing information associated with the voice being monitored and retrieving the information associated with those individuals so that this information may be passed along to the appropriate agency or organization for further action using the system and method of the present invention.
- a monitoring agency 22 may extract a voice sample of the speaker(s) engaged in the monitored conversation.
- the voice sample(s) is taken and processed in a manner similar to the voice sample obtained from the speaker originally.
- the monitored voice sample is digitized and processed into a suitable form for achieving efficient and fast recognition processing.
- the sample may preferably be digitized and stored in a phonemic representation.
- the monitoring agency 22 communicates the voice sample to the recognition and match system.
- the recognition and match system 24 compares the monitored voice sample to the voice samples stored in the central database 20 . If no match is realized, a message to that effect will be transmitted to the monitoring agency 22 that requested the check.
- the central computer 18 may query the monitoring agency 22 to determine if additional information regarding the speaker should be communicated to the monitoring agency. For example, the conversation being monitored may be of low priority and the monitoring agency 22 may only desire to know the speaker's identity, and is not concerned with other information. Alternatively, the central computer 18 may automatically send the associated information related to the speaker to the monitoring agency 22 .
- the monitoring agency 22 may then take whatever action it deems necessary based on, for example, the nature of the monitored conversation, the nature of the speaker, etc. Alternatively, the monitoring agency 22 may communicate the information regarding the speaker and the nature of the conversation being monitored to another authority, for example, law enforcement authorities, for further action based on the monitored conversation and the associated information.
- the location of a speaker being monitored may be ascertained in various ways. For example, a speaker using a conventional telephone may be located using caller ID information and/or well known telephone tracing methodologies available on PSTNs. On the other hand, if a speaker is using a cellular telephone, it is possible to determine which base station(s) is being used to transmit and/or receive the cellular signal to/from the cellular telephone being monitored, and to superimpose global positioning system (GPS) information on a map showing the locations of terrestrial base stations, to determine the physical location of a speaker within a reasonable range.
- GPS global positioning system
- speaker location data may be stored together with the associated data linked to the speaker's voice sample in the database.
- the initial voice sampling need not be obtained at an entry point to the U.S., but may be taken at an office where the speaker is being processed for any of a variety of reasons, such as, for example, those set forth above in the Background and Summary sections.
Abstract
Description
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/320,706 US7272565B2 (en) | 2002-12-17 | 2002-12-17 | System and method for monitoring individuals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/320,706 US7272565B2 (en) | 2002-12-17 | 2002-12-17 | System and method for monitoring individuals |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040116842A1 US20040116842A1 (en) | 2004-06-17 |
US7272565B2 true US7272565B2 (en) | 2007-09-18 |
Family
ID=32506924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/320,706 Expired - Fee Related US7272565B2 (en) | 2002-12-17 | 2002-12-17 | System and method for monitoring individuals |
Country Status (1)
Country | Link |
---|---|
US (1) | US7272565B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7386151B1 (en) * | 2004-10-15 | 2008-06-10 | The United States Of America As Represented By The Secretary Of The Navy | System and method for assessing suspicious behaviors |
US20120249328A1 (en) * | 2009-10-10 | 2012-10-04 | Dianyuan Xiong | Cross Monitoring Method and System Based on Voiceprint Recognition and Location Tracking |
US20130288652A1 (en) * | 2011-01-05 | 2013-10-31 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful Interception of Speech Communication in a Communication Network |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7979279B1 (en) * | 2003-07-17 | 2011-07-12 | At&T Intellectual Property I, Lp | System and method for monitoring communications |
US7515738B1 (en) * | 2004-08-06 | 2009-04-07 | The United States Of America As Represented By The Secretary Of The Navy | Biometric data collection and storage system |
US7769207B2 (en) * | 2005-04-01 | 2010-08-03 | Olivo Jr John W | System and method for collection, storage, and analysis of biometric data |
US7881939B2 (en) * | 2005-05-31 | 2011-02-01 | Honeywell International Inc. | Monitoring system with speech recognition |
US9785662B2 (en) | 2008-10-14 | 2017-10-10 | Mobilegaurd Inc. | System and method for capturing data sent by a mobile device |
US20150052074A1 (en) * | 2011-01-15 | 2015-02-19 | Ted W. Reynolds | Threat Identification and Mitigation in Computer-Mediated Communication, Including Online Social Network Environments |
US9264532B2 (en) * | 2013-01-31 | 2016-02-16 | International Business Machines Corporation | Technology for combating mobile phone criminal activity |
CN105324044A (en) * | 2014-01-14 | 2016-02-10 | 深圳市杰仕博科技有限公司 | Electronic atomization apparatus |
CN111383659B (en) * | 2018-12-28 | 2021-03-23 | 广州市百果园网络科技有限公司 | Distributed voice monitoring method, device, system, storage medium and equipment |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4773093A (en) * | 1984-12-31 | 1988-09-20 | Itt Defense Communications | Text-independent speaker recognition system and method based on acoustic segment matching |
JPS63253480A (en) | 1987-04-10 | 1988-10-20 | Hitachi Ltd | Card system for confirmation of voiceprint |
US5023901A (en) * | 1988-08-22 | 1991-06-11 | Vorec Corporation | Surveillance system having a voice verification unit |
US5621889A (en) * | 1993-06-09 | 1997-04-15 | Alcatel Alsthom Compagnie Generale D'electricite | Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facility |
US5742233A (en) | 1997-01-21 | 1998-04-21 | Hoffman Resources, Llc | Personal security and tracking system |
US6141644A (en) * | 1998-09-04 | 2000-10-31 | Matsushita Electric Industrial Co., Ltd. | Speaker verification and speaker identification based on eigenvoices |
US20020017999A1 (en) | 2000-08-10 | 2002-02-14 | Yasumasa Akazawa | Searching system |
US6396954B1 (en) | 1996-12-26 | 2002-05-28 | Sony Corporation | Apparatus and method for recognition and apparatus and method for learning |
US20020107694A1 (en) * | 1999-06-07 | 2002-08-08 | Traptec Corporation | Voice-recognition safety system for aircraft and method of using the same |
US6480825B1 (en) | 1997-01-31 | 2002-11-12 | T-Netix, Inc. | System and method for detecting a recorded voice |
US20020198731A1 (en) | 2001-06-26 | 2002-12-26 | Barnes Jessica M. | Method and apparatus for processing an international passenger |
US6529881B2 (en) | 1996-06-28 | 2003-03-04 | Distributed Software Development, Inc. | System and method for identifying an unidentified customer at the point of sale |
US20030044050A1 (en) | 2001-08-28 | 2003-03-06 | International Business Machines Corporation | System and method for biometric identification and response |
US20030154084A1 (en) * | 2002-02-14 | 2003-08-14 | Koninklijke Philips Electronics N.V. | Method and system for person identification using video-speech matching |
US20030200311A1 (en) | 2002-01-08 | 2003-10-23 | Baum Robert T. | Methods and apparatus for wiretapping IP-based telephone lines |
US20040029564A1 (en) | 2002-08-08 | 2004-02-12 | Hodge Stephen Lee | Telecommunication call management and monitoring system |
US6697779B1 (en) | 2000-09-29 | 2004-02-24 | Apple Computer, Inc. | Combined dual spectral and temporal alignment method for user authentication by voice |
US20040059923A1 (en) | 2002-09-25 | 2004-03-25 | Shamrao Andrew Divaker | Systems and methods for authentication |
US20040064453A1 (en) | 2002-09-27 | 2004-04-01 | Antonio Ruiz | Large-scale hierarchical identification and verification for secured ingress and egress using biometrics |
US6738784B1 (en) * | 2000-04-06 | 2004-05-18 | Dictaphone Corporation | Document and information processing system |
US6799163B2 (en) * | 2002-06-05 | 2004-09-28 | Vas International, Inc. | Biometric identification system |
US6839410B2 (en) | 1998-09-01 | 2005-01-04 | At&T Corp. | Method and apparatus for setting user communication parameters based on voice identification of users |
-
2002
- 2002-12-17 US US10/320,706 patent/US7272565B2/en not_active Expired - Fee Related
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4773093A (en) * | 1984-12-31 | 1988-09-20 | Itt Defense Communications | Text-independent speaker recognition system and method based on acoustic segment matching |
JPS63253480A (en) | 1987-04-10 | 1988-10-20 | Hitachi Ltd | Card system for confirmation of voiceprint |
US5023901A (en) * | 1988-08-22 | 1991-06-11 | Vorec Corporation | Surveillance system having a voice verification unit |
US5621889A (en) * | 1993-06-09 | 1997-04-15 | Alcatel Alsthom Compagnie Generale D'electricite | Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facility |
US6529881B2 (en) | 1996-06-28 | 2003-03-04 | Distributed Software Development, Inc. | System and method for identifying an unidentified customer at the point of sale |
US6396954B1 (en) | 1996-12-26 | 2002-05-28 | Sony Corporation | Apparatus and method for recognition and apparatus and method for learning |
US5742233A (en) | 1997-01-21 | 1998-04-21 | Hoffman Resources, Llc | Personal security and tracking system |
US6480825B1 (en) | 1997-01-31 | 2002-11-12 | T-Netix, Inc. | System and method for detecting a recorded voice |
US6839410B2 (en) | 1998-09-01 | 2005-01-04 | At&T Corp. | Method and apparatus for setting user communication parameters based on voice identification of users |
US6141644A (en) * | 1998-09-04 | 2000-10-31 | Matsushita Electric Industrial Co., Ltd. | Speaker verification and speaker identification based on eigenvoices |
US20020107694A1 (en) * | 1999-06-07 | 2002-08-08 | Traptec Corporation | Voice-recognition safety system for aircraft and method of using the same |
US6738784B1 (en) * | 2000-04-06 | 2004-05-18 | Dictaphone Corporation | Document and information processing system |
US20020017999A1 (en) | 2000-08-10 | 2002-02-14 | Yasumasa Akazawa | Searching system |
US6697779B1 (en) | 2000-09-29 | 2004-02-24 | Apple Computer, Inc. | Combined dual spectral and temporal alignment method for user authentication by voice |
US20020198731A1 (en) | 2001-06-26 | 2002-12-26 | Barnes Jessica M. | Method and apparatus for processing an international passenger |
US20030044050A1 (en) | 2001-08-28 | 2003-03-06 | International Business Machines Corporation | System and method for biometric identification and response |
US20030200311A1 (en) | 2002-01-08 | 2003-10-23 | Baum Robert T. | Methods and apparatus for wiretapping IP-based telephone lines |
US20030154084A1 (en) * | 2002-02-14 | 2003-08-14 | Koninklijke Philips Electronics N.V. | Method and system for person identification using video-speech matching |
US6799163B2 (en) * | 2002-06-05 | 2004-09-28 | Vas International, Inc. | Biometric identification system |
US20040029564A1 (en) | 2002-08-08 | 2004-02-12 | Hodge Stephen Lee | Telecommunication call management and monitoring system |
US20040059923A1 (en) | 2002-09-25 | 2004-03-25 | Shamrao Andrew Divaker | Systems and methods for authentication |
US20040064453A1 (en) | 2002-09-27 | 2004-04-01 | Antonio Ruiz | Large-scale hierarchical identification and verification for secured ingress and egress using biometrics |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7386151B1 (en) * | 2004-10-15 | 2008-06-10 | The United States Of America As Represented By The Secretary Of The Navy | System and method for assessing suspicious behaviors |
US20120249328A1 (en) * | 2009-10-10 | 2012-10-04 | Dianyuan Xiong | Cross Monitoring Method and System Based on Voiceprint Recognition and Location Tracking |
US9218814B2 (en) * | 2009-10-10 | 2015-12-22 | Dianyuan Xiong | Cross monitoring method and system based on voiceprint recognition and location tracking |
US20130288652A1 (en) * | 2011-01-05 | 2013-10-31 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful Interception of Speech Communication in a Communication Network |
Also Published As
Publication number | Publication date |
---|---|
US20040116842A1 (en) | 2004-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7634063B2 (en) | System and method for monitoring individuals | |
US7590232B2 (en) | System and method for tracking individuals | |
US7272565B2 (en) | System and method for monitoring individuals | |
US8458465B1 (en) | Biometric authentication | |
US9591126B2 (en) | Personal allowed number system | |
US8924285B2 (en) | Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist | |
US10084909B2 (en) | System and method for controlling free phone calls through an institutional phone system | |
US20050125226A1 (en) | Voice recognition system and method | |
US20030070076A1 (en) | System and method for providing personal information about criminal offenders to a plurality of law enforcement agencies | |
US20120054202A1 (en) | Method and System for Screening Using Voice Data and Metadata | |
US20080100414A1 (en) | Secure profile setting in a shared device | |
CN112416730A (en) | User internet behavior analysis method and device, electronic equipment and storage medium | |
US7173532B2 (en) | Intelligent controlled entry-exit system | |
JP6022115B1 (en) | Information processing system | |
US20030142800A1 (en) | Method and system for voting by telephone | |
US7386151B1 (en) | System and method for assessing suspicious behaviors | |
EP4163811A1 (en) | Personal information protection-based speech information processing service provision system | |
AU2385700A (en) | Security and user convenience through voice commands | |
US11928749B2 (en) | System and method for continuous biometric monitoring | |
KR100726670B1 (en) | Method and System of checking real name using a internet resident registration number | |
US20230036423A1 (en) | Method and Apparatus for Obtaining Identifying Information from Biometric Data | |
CN114466314B (en) | Fixed crowd mobile phone number screening method based on base station positioning | |
KR100309219B1 (en) | Network-based speaker learning and verification method and system thereof | |
US8189783B1 (en) | Systems, methods, and programs for detecting unauthorized use of mobile communication devices or systems | |
CN107451437B (en) | Locking method and device of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TECHNOLOGY PATENTS, LLC, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARDIROSSIAN, ARIS;REEL/FRAME:014008/0770 Effective date: 20030410 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: PATENTS INNOVATIONS, LLC, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TECHNOLOGY PATENTS, LLC;REEL/FRAME:029780/0160 Effective date: 20130120 Owner name: IO LIMITED PARTNERSHIP LLLP, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TECHNOLOGY PATENTS, LLC;REEL/FRAME:029780/0160 Effective date: 20130120 Owner name: JERUNAZARGABR, LLC, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TECHNOLOGY PATENTS, LLC;REEL/FRAME:029780/0160 Effective date: 20130120 Owner name: A2MK, LLC, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TECHNOLOGY PATENTS, LLC;REEL/FRAME:029780/0160 Effective date: 20130120 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20150918 |